Log in to InfoSec to complete the labs below and take screenshots at the steps below:
Viewing Protocols with Wireshark – Step 18 – Telnet Login
Viewing Protocols with Wireshark – Step 24 – Echo
Parsing Objects with Wireshark – Step 12 – Challenge 2, 3, and 4 Complete
Using Network Miner – Step 6 – Usernames and Passwords
Using Network Miner – Step 12 – Challenge 5 and 6 Complete
To complete this assignment, review the prompt and grading rubric in the Lab Guidelines and Rubric. Refer to the Course Lab Guidelines PDF document to view the screenshots you will need to take to complete this lab. Screenshots must include your name and date. When you have finished your work, submit the assignment in a Microsoft Word document with the associated screenshots for grading and instructor feedback.
Category: Computer Science homework help
ASSIGNMENT 1: In this journal reflection, you will answer the questions below
ASSIGNMENT 1:
In this journal reflection, you will answer the questions below to help you formulate your topic.
Please address the following in your journal:
Identify a topic in your specialization. (For IT students, Information Technology is not a topic, however, Millennial’s perceptions of smart phone technology could be a topic. For leadership students, leadership or leadership styles would be too broad. You could, however, compare leader and followers perceptions of leadership styles in private four year institutions. These are examples).
What is the current problem related to your topic? Who is the problem happening to? Where is the problem happening? Provide at least two citations to show that the problem is still happening today.
What part of the problem listed in #2 do you want to research and why?
What methodology are you planning on using? (If you are unsure, do you plan on a quantitative or qualitative study? You will determine your methodology in 839).
For the methodology listed in #4, how and where will you get your data?
What theories or frameworks (i.e. transformational leadership theory, technology acceptance model, etc) will guide your study? What are the origins of these theories?
Share your topic idea(s) by going to the “Week 1 Assignment – Journal Reflection on Topic Ideas” link above.
2.2 – Week 2 – Dissertation Summary Overview: Using mentor or model texts is
2.2 – Week 2 – Dissertation Summary
Overview: Using mentor or model texts is a strategy to improve your own writing. The New York Times describes mentor texts as, “Demystifying the writing process via examples students can learn from and emulate.” In this assignment, you will locate a mentor text in the form of a dissertation that may or may not be similar to your own topic to use as a model while you write your chapter 2. It is most helpful to find a dissertation with a literature review similar to your own, but if that is not possible, you may look for the next best option.
Directions:
Use ProQuest Dissertations & Theses Global database on the UC Library website to locate mentor text dissertation (preferably it would be related to your topic).
You may need to use advanced search options to help narrow your search.
Scan read the entire dissertation.
Carefully read the literature review section.
Provide a one-paragraph summary of the entire literature review.
Write a second paragraph about what you learned through reviewing chapter 2.
Additional Information:
ProQuest Dissertations & Theses Global database is accessible through the Databases link below the blue picture on the Library website. The Databases tab will access an alphabetical list of the Library databases. The dissertation database is listed twice, as Dissertations and Theses and as ProQuest Dissertations and Theses. Both links access the same database. Many of the dissertations published since 1997 are available in full text with a link to the PDF.
Here is the link to the P section of the database listings https://ucumberlands.libguides.com/az.php?a=p
Please refer to the attached documents for the assignment. Assignment Details:
Please refer to the attached documents for the assignment.
Assignment Details:
Part I – Using the attached Requirements template, create a list of requirements for a Smart Highway with at least five (5) integrated Smart systems identified in your research with at least 40 requirements (total) for these five (5) Smart systems. PMI (2021) indicates “the term requirement generally refers to a customer need while specification refers to a detailed, usually technical description of how that need will be met” (para. 1). A Requirement states what a product must/will/can do or a quality it possesses. A Specification is a collection of requirements that are used in the design of that product. Do not include specifications (such as products that you discover) – just requirements.
Part II – Write at least a 5 page Word document, double-spaced, detailing your proposed trip on a Smart Highway. The paper must include all five (5) of the integrated Smart systems identified in your research and two (2) requirements for each of the five (5) integrated Smart systems. Your paper must include at least seven (7) references along with their in-text citations. Research must include scholarly references but can also include YouTube videos, websites, blogs, etc. on the Smart system(s). Also view YouTube videos on Augmented Reality and Virtual Reality to extend your research on how Smart systems may evolve over time.
Submit your paper and your Requirements list, using the template provided.
In this lab, we will investigate the content and use of device addressing at the
In this lab, we will investigate the content and use of device addressing at the Data Link layer. The lab includes investigation of hardware addressing on your own computing device as well analysis of Data Link Layer addressing information in network traffic, using Wireshark to examine a packet capture (pcap) file. Download the attached instructions for this exercise. When you have completed the lab, click on the assignment link to submit your finished work.
Too often, statistics are used to ‘prove’ some point or to persuade an audienc
Too often, statistics are used to ‘prove’ some point or to persuade an audience to some particular point of view, without really being accurate, complete, or honest. This issue has been the subject of numerous texts. You may be interested in reading such titles as: Damned Lies and Statistics, or How to Lie with Statistics. To fulfill this discussion board activity, complete the following:
Research one example where data analysis might have been misused or misapplied. Read about the example thoroughly so that you understand how analytics was used, and why it was problematic.
Share your chosen example, documenting your source. Be sure to summarize the scenario thoroughly.
Explain why use of analytics contributed to the problem.
Discuss the consequences of the matter. Did the company/organization involved suffer any adverse consequences? If so, were the related to public opinion/trust, were they financial, were they punitive, etc.?
Research some common issues with data formatting, transfer, and manipulation
Research some common issues with data formatting, transfer, and manipulation. In APA format, write 3 paragraphs describing some of the issues you learned about. Describe why such issues might represent a problem for data analysts. Cite at least three sources in APA format. .
Consider firewall placement on a network. There are better placements and some
Consider firewall placement on a network. There are better placements and some that can actually negate the benefit and purpose of adding a firewall to the network. What advice can you provide that would benefit a cybersecurity analyst if they were tasked with network security.
Overview You work for Strategic Security Consulting Group (SSCG). Recently, one
Overview
You work for Strategic Security Consulting Group (SSCG). Recently, one of your clients in Los Angeles, North Star Software Developers (NSSD), called with a big problem. Some of its network servers were compromised, resulting in the possible loss of personal information and credit card numbers of purchasers of the company’s software products. It is not presently known whether this attack came from inside or outside of the company. NSSD is currently dealing with this problem as best as it can, but it needs your company to help prevent this from happening again in the future.
Prompt
You have been assigned to create a training manual for NSSD’s IT personnel in which you test, describe, and recommend a variety of network security tools that, when used properly, will mitigate both the risk of future breaches and the effects of a breach when it takes place.
In each section of the training manual, develop guidelines for employees to select and employ specific software, tools, or methods to address the elements of the section topic. Your guidelines serve as recommendations of specific tools and criteria for determining when to use these tools.
Specifically, the following critical elements must be addressed:
Communicate the significance of viewing, displaying, and filtering captured packets.
Explain the significance of alert response procedures to traffic anomalies identified through monitoring network traffic and examining logs.
What to Submit
Fill in Section One of the Training Manual Template document. This section contains two topics in which you will address best practices and tools and methodology. For this assignment, you must follow these formatting guidelines: 12-point Times New Roman font and APA references and citations.
The CISO of the organization reaches out to you, the senior information security
The CISO of the organization reaches out to you, the senior information security officer, and tasks you with creating an agency-wide security awareness program. He states that he will give you all of his support to complete this project (remember, this is the first component of security awareness program). He hands you a security gap analysis (the second component of a security awareness program) that was conducted, which shows 10 major security findings. These 10 deficiencies will serve as the foundation for developing the agency’s security awareness program (see the Case Document for more details on the gap analysis)
Based on the scenario provided in the Case Document, develop the Introduction to your Proposal. In your introduction, be sure to include the purpose of the proposal, address the security concerns of the chief executive officer (CEO), explain why the security awareness proposal will be vital to the organization, describe how the security posture will be addressed, clarify how human factors will be assessed, and list any organizational factors that will contribute to the status of the security posture:
The final project for this course is the creation of a security awareness program proposal. In Module Two, you will take the first step in completing this project by creating the introduction section of your proposal. Begin by reviewing the Case Document, which will provide you with information about the organization for which you are creating the security awareness program proposal. Then, based on the scenario provided in the Case Document, write an introduction to your proposal that addresses the concerns of the chief executive officer and explains why the security awareness proposal will be vital to the organization.
Specifically, the following critical elements must be addressed:
What is the purpose of your proposal? Why is the new security awareness program vital for the organization? Use specific examples to illustrate your claims.
Overall, how would you characterize the security posture of the organization? What were the major findings in your risk assessment of the organization’s current security awareness policies, practices, and processes?
Specifically, are there human factors that adversely affect the security climate within the organization? If so, how? Be sure to consider unintentional and intentional threats to a healthy security culture.
Specifically, are there organizational factors that contribute to an unhealthy security culture in the organization? If so, how? Be sure to consider organizational data flow, work setting, work planning and control, and employee readiness.
What to Submit
Your paper must be submitted as a two- to four-page Word document with double spacing, 12-point Times New Roman font, and one-inch margins, in APA format.
See attached case ….